Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

If your company's official website is tampered, the consequence of such attack could NOTbe:

A.

Website is used for some illegal attempts

B.

Public image or reputation of your company is damaged

C.

Business is impacted

D.

Physical server is damaged

In Linux OS, if you want to set a file access privilege to read, write, and execute for the

owner only, what octal number will reflect such settings correctly?

Score 2

A.

755

B.

700

C.

777

D.

766

Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)

A.

Cache-Control

B.

Date

C.

Age

D.

Expires

E.

Host

Which of the following statements is NOT true about EIP and NAT gateway?

A.

NAT gateway can support multi servers inside VPC to access public internet through one

public IP

B.

EIP can be bind to different ECS servers at the same time

C.

Different EIP can't share bandwidth

D.

NAT gateway can support shared bandwidth between several ips

Which of the following steps is not a valid step for using anti-DDOS pro?

A.

configure to be protected domain name

B.

add new DNS record

C.

change source IP

D.

if original server is using its own firewall, then need to add Anti-DDOS pro IP to its white

list

E.

bind real customer identity to anti-DDOS pro IP

Which commands can be used to reload the operation system? (Correct Answers: 2)

A.

reload

B.

shutdown

C.

init

D.

restart

Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following

statements is true about this 'hot fix'?

A.

hot fix doesn't need to reboot physical host

B.

service will not be available during the hot fix

C.

hot fix means the host need to reach some temperature upper limit to be able to

proceed

D.

hot fix is transparent to end user

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

A.

To improve server resource usage

B.

to improve system usability

C.

to enhance system functionality

D.

to avoid existing system vulnerabilities being used by some hackers

Which of the following protocol is dedicated to resolve IP and MAC addresses?

A.

TCP

B.

ARP

C.

DNS

D.

ICMP

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises